Home | History | Annotate | Download | only in eap_peer

Lines Matching defs:tlv

505 	wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
528 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
551 "Payload TLV (len=%lu)",
559 "EAP Payload TLV");
582 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
594 "Crypto-Binding TLV: Version %d "
621 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
756 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
864 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
878 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
934 /* RFC 5422, Section 4.2.6 - PAC-Type TLV */
1048 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1059 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1069 struct eap_fast_tlv_parse *tlv,
1075 os_memset(tlv, 0, sizeof(*tlv));
1087 wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
1091 "TLV type %d length %d%s",
1094 res = eap_fast_parse_tlv(tlv, tlv_type, pos, len);
1100 "mandatory TLV type %d", tlv_type);
1105 "unknown optional TLV type %d",
1165 struct eap_fast_tlv_parse tlv;
1168 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1174 if (tlv.result == EAP_TLV_RESULT_FAILURE) {
1180 if (tlv.iresult == EAP_TLV_RESULT_FAILURE) {
1186 if (tlv.crypto_binding) {
1188 tlv.crypto_binding,
1189 tlv.crypto_binding_len);
1196 if (tlv.iresult == EAP_TLV_RESULT_SUCCESS) {
1202 if (tlv.eap_payload_tlv) {
1204 sm, data, ret, tlv.eap_payload_tlv,
1205 tlv.eap_payload_tlv_len);
1209 if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) {
1210 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1213 } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) {
1214 tmp = eap_fast_process_pac(sm, data, ret, tlv.pac,
1215 tlv.pac_len);
1220 !data->anon_provisioning && !tlv.pac &&
1221 (tlv.iresult == EAP_TLV_RESULT_SUCCESS ||
1222 tlv.result == EAP_TLV_RESULT_SUCCESS)) {
1232 if (tlv.result == EAP_TLV_RESULT_SUCCESS && !failed) {
1240 if (resp && tlv.result == EAP_TLV_RESULT_SUCCESS && !failed &&
1241 tlv.crypto_binding && data->phase2_success) {
1304 wpa_hexdump_buf(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
1309 "TLV frame (len=%lu)",
1331 * supports both raw A-ID and one inside an A-ID TLV.
1341 wpa_printf(MSG_DEBUG, "EAP-FAST: A-ID was in TLV "
1382 u8 *tlv;
1388 tlv = os_malloc(tlv_len);
1389 if (tlv) {
1390 ehdr = (struct eap_tlv_hdr *) tlv;
1395 if (tlv == NULL ||
1398 tlv, tlv_len) < 0) {
1401 os_free(tlv);
1404 os_free(tlv);